Your message dated Wed, 14 Mar 2007 14:32:03 +0000 with message-id <[EMAIL PROTECTED]> and subject line Bug#414617: fixed in aptitude 0.4.4-4 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---Package: aptitude Version: 0.4.4-3 Severity: serious Hi, Your package is failing to build on amd64. It has a segfault during the test suite. It segfaults here: #0 0x00002b7518ba75d0 in strlen () from /lib/libc.so.6 #1 0x00002b7518b794bc in vfprintf () from /lib/libc.so.6 #2 0x00002b7518b9972a in vsnprintf () from /lib/libc.so.6 #3 0x000000000050ddb9 in vssprintf (format=0x510686 "%s %d", ap=0x7fff92ba7f10) at util.cc:76 #4 0x000000000050e17a in ssprintf (format=0x510686 "%s %d") at util.cc:56 #5 0x00000000004212eb in MiscTest::test_ssprintf (this=<value optimized out>) at test_misc.cc:106 #6 0x00002b7518040a37 in CppUnit::TestCaseMethodFunctor::operator() () from /usr/lib/libcppunit-1.12.so.0 #7 0x00002b7518032d94 in CppUnit::DefaultProtector::protect () from /usr/lib/libcppunit-1.12.so.0 #8 0x00002b751803cb49 in CppUnit::ProtectorChain::ProtectFunctor::operator() () from /usr/lib/libcppunit-1.12.so.0 #9 0x00002b751803c895 in CppUnit::ProtectorChain::protect () from /usr/lib/libcppunit-1.12.so.0 #10 0x00002b7518048580 in CppUnit::TestResult::protect () from /usr/lib/libcppunit-1.12.so.0 #11 0x00002b7518040710 in CppUnit::TestCase::run () from /usr/lib/libcppunit-1.12.so.0 #12 0x00002b751804100b in CppUnit::TestComposite::doRunChildTests () from /usr/lib/libcppunit-1.12.so.0 #13 0x00002b7518040f36 in CppUnit::TestComposite::run () from /usr/lib/libcppunit-1.12.so.0 #14 0x00002b751804100b in CppUnit::TestComposite::doRunChildTests () from /usr/lib/libcppunit-1.12.so.0 #15 0x00002b7518040f36 in CppUnit::TestComposite::run () from /usr/lib/libcppunit-1.12.so.0 #16 0x00002b751804835a in CppUnit::TestResult::runTest () from /usr/lib/libcppunit-1.12.so.0 #17 0x00002b751804a9c2 in CppUnit::TestRunner::run () from /usr/lib/libcppunit-1.12.so.0 #18 0x00002b751804d96b in CppUnit::TextTestRunner::run () from /usr/lib/libcppunit-1.12.so.0 #19 0x000000000040873c in main (argc=<value optimized out>, argv=<value optimized out>) at main.cc:31 (gdb) frame 3 #3 0x000000000050ddb9 in vssprintf (format=0x510686 "%s %d", ap=0x7fff92ba7f10) at util.cc:76 76 const int amt2 = vsnprintf(buf2, buf2size, format, ap); Your code does: const int amt = vsnprintf(buf, initbufsize, format, ap); [...] const int amt2 = vsnprintf(buf2, buf2size, format, ap); You're using "ap" twice, which is not supported. You might need to do a va_copy() first. (This might also be the reason it's failing to build on the other arches.) Kurt
--- End Message ---
--- Begin Message ---Source: aptitude Source-Version: 0.4.4-4 We believe that the bug you reported is fixed in the latest version of aptitude, which is due to be installed in the Debian FTP archive: aptitude-doc-cs_0.4.4-4_all.deb to pool/main/a/aptitude/aptitude-doc-cs_0.4.4-4_all.deb aptitude-doc-en_0.4.4-4_all.deb to pool/main/a/aptitude/aptitude-doc-en_0.4.4-4_all.deb aptitude-doc-fi_0.4.4-4_all.deb to pool/main/a/aptitude/aptitude-doc-fi_0.4.4-4_all.deb aptitude-doc-fr_0.4.4-4_all.deb to pool/main/a/aptitude/aptitude-doc-fr_0.4.4-4_all.deb aptitude_0.4.4-4.diff.gz to pool/main/a/aptitude/aptitude_0.4.4-4.diff.gz aptitude_0.4.4-4.dsc to pool/main/a/aptitude/aptitude_0.4.4-4.dsc aptitude_0.4.4-4_i386.deb to pool/main/a/aptitude/aptitude_0.4.4-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Daniel Burrows <[EMAIL PROTECTED]> (supplier of updated aptitude package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Tue, 13 Mar 2007 20:49:58 -0700 Source: aptitude Binary: aptitude-doc-cs aptitude-doc-fr aptitude-doc-fi aptitude-doc-en aptitude Architecture: source all i386 Version: 0.4.4-4 Distribution: unstable Urgency: low Maintainer: Daniel Burrows <[EMAIL PROTECTED]> Changed-By: Daniel Burrows <[EMAIL PROTECTED]> Description: aptitude - terminal-based apt frontend aptitude-doc-cs - Czech manual for aptitude, a terminal-based apt frontend aptitude-doc-en - English manual for aptitude, a terminal-based apt frontend aptitude-doc-fi - Finnish manual for aptitude, a terminal-based apt frontend aptitude-doc-fr - French manual for aptitude, a terminal-based apt frontend Closes: 414617 Changes: aptitude (0.4.4-4) unstable; urgency=low . * In addition to the bugfix for ssprintf, the last release included a new test case to ensure that the bug did not recur. As it turned out, this test case revealed that both the old and the new code were buggy on amd64! vssnprintf now handles its variable argument list properly, using va_copy in case it has to access the list a second time. (Closes: #414617) Files: b13b05aee2efae68816258db9bbd2824 803 admin - aptitude_0.4.4-4.dsc 8a868ef40a0c579e8d84ce44deda3b76 319432 admin - aptitude_0.4.4-4.diff.gz 6d8711d957a148b0de877a7afccbc9e0 340200 doc optional aptitude-doc-cs_0.4.4-4_all.deb 4ec962a3ff666c0b86cc4ed823f8ec8d 325620 doc optional aptitude-doc-en_0.4.4-4_all.deb 44fa6b7804727c8fae415d83947ab2eb 257588 doc optional aptitude-doc-fi_0.4.4-4_all.deb 42edb4c687cccdd1ecccd5b16c32db85 270562 doc optional aptitude-doc-fr_0.4.4-4_all.deb 02c98bc554b7b0f9e78c22e833dbd1dc 2873184 admin important aptitude_0.4.4-4_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFF+ALvch6xsM7kSXgRAjsrAJ0eSUuEmqCE2VpNChj+NqvXM0fhVACg088h CPyKZG22DcC7Y7r6D1/zw2k= =F525 -----END PGP SIGNATURE-----
--- End Message ---

